work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience : Bachelor's degree - or - 4 years of additional experience in lieu of degree. 2-5 years related experience, especially More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Required Education and Experience : Bachelor's degree -or- 4 years of relevant additional experience in lieu of degree 2-5 years related More ❯
Job Description: We are seeking a Junior Engineer to support the test, evaluation, and integration of C5ISR systems with a focus on configurationmanagement and electromagnetic environmental effects (E3). The ideal candidate will have a foundational understanding of EMI/EMC, EMP, and shipboard electromagnetic compatibility and will work alongside senior engineers to conduct testing, analysis, and … technical assessments in support of Navy programs. Key Responsibilities: Assist in the test, evaluation, and integration of C5ISR systems related to configuration management. Support EMI/EMC analysis, problem investigation, and mitigation strategies. Conduct E3 computation, modeling, and simulation to assess electromagnetic effects. Participate in EMP and PCI shipboard testing to ensure system resilience and compliance. Perform technical assessments … in an engineering, scientific, or technical discipline from an accredited college or university. At least one (1) year of experience in test, evaluation, and integration related to C5ISR system configuration management. Experience in one or more of the following areas: Integrated Topside Design EMP testing, modeling, and simulation E3 computation and analysis EMI/EMC problem investigation and resolution More ❯
the IT Service Delivery Manager, the Application Support Analyst has primary responsibility for providing day to day operational support for the Company Application Portfolio, through the effective use and management of incident, requests and problems. You will be responsible for the regular monitoring and maintenance of the application portfolio. You will be responsible for the change management process … plan and are scheduled in conjunction with the SSC and 3 rd party suppliers as appropriate. In addition you will provide appropriate SharePoint expertise, in terms of support, content management and development of sites, services and functionality. Responsibilities Provide 2 nd and 3 rd line support for the Company application portfolio Monitor application systems, identifying performance trends and taking … as required for project deliverables Ensure that pro-formas are completed and submitted and track delivery Provide test support for new and enhanced systems/applications Responsible for Change Management process, ensuring that changes are managed, roll-back plans are in place and that they are appropriately scheduled and approved, liasing with SSC Change Manager Owns ConfigurationManagementMore ❯
responsive, effective, and customer focused service relating to the Trust End User Workspace infrastructure. This role focuses on the delivery of an efficient trust wide Active Directory infrastructure and management of all end user devices. The post holder will deliver on service requirements based on the standard policies and procedure defined by the organisation. The primary goal of the … role is to improve the End User experience through evaluating and refining the configuration of existing, future end user devices and delivering strategy that increases the effectiveness of Hardware and Software asset optimisation throughout the Trust. Working closely with Digital Services managers to ensure a focused, structured and co-ordinated approach to the provision and delivery of the End … be highly complex. The post holder will develop close working relationships with all members of the Digital Services teams with particular focus on Tech Bar, Infrastructure and IT Asset Management teams. Main duties of the job For Main Duties of the Job - Please see attached detailed - Job Description and Person Specification File. About us The Christie is one of More ❯
Demonstrates high responsiveness for technology issues, security compliance, and SLA attainment Drives problems to root cause through partnership with engineers, ensuring knowledge is captured for future events Develops software configurationmanagement standards and performs data de-identification and provisioning Documents and tracks hardware and software configuration, migration, testing, and deployment solutions rovides user support for an enterprise More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
of the client LAN/WAN devices. Respond to and resolve incident tickets. Draft and implement standard network change requests. Provide support to Tier III network engineers for incident management and projects (site surveys, TEMS, coordinate and install new equipment). Perform configurationmanagement functions such as update topology drawings, ensure asset management records are accurate More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
Signature Federal Systems has an opening for a Government Network Operations Center (GNOC) Tier II Incident Management Technician to support the customer's computer data communications systems, providing network event management and incident troubleshooting. Technicians provide additional support by ensuring network devices meet baseline configurations, software, and network performance standards. Technicians will make extensive use of Microfocus tools … Respond to, update, and resolve incident tickets within ServiceNow. • Administer networks including hardware, systems software, applications software, and all hardware configurations. • Coordinate network operations, maintenance, repairs, or upgrades. Perform configurationmanagement functions such as validating topology drawings and ensure that asset management records are accurate. • Leverage knowledge of OSI layers 1, 2, and 3 to troubleshoot various More ❯
of the client LAN/WAN devices. • Respond to and resolve incident tickets. • Draft and implement standard network change requests. • Provide support to Tier III network engineers for incident management and projects (site surveys, TEMS, coordinate and install new equipment). • Perform configurationmanagement functions such as update topology drawings, ensure asset management records are accurate More ❯
of the client LAN/WAN devices. • Respond to and resolve incident tickets. • Draft and implement standard network change requests. • Provide support to Tier III network engineers for incident management and projects (site surveys, TEMS, coordinate and install new equipment). • Perform configurationmanagement functions such as update topology drawings, ensure asset management records are accurate More ❯
for this particular role. Salary: Circa £75,300 + depending on experience plus executive benefits What you'll be doing: Lead strategic continuous improvement initiatives across the Group Information Management and Technology (IM&T) Strategy and Architecture Centre of Expertise, ensuring alignment with enterprise-wide goals Drive the development and adoption of future-focused tools, methods, and frameworks across … senior IM&T authorities Your skills and experiences: Experience working within large, complex organisations with a broad understanding of Information Technology and digital environments Knowledge and practical application of configurationmanagement, change management, and assurance-led programmes Proven track record in supporting the delivery of projects across multiple IT and digital disciplines Leadership skills in operational managementMore ❯
a resource loaded schedule to support office planning, staffing of skill sets, and software tool development needs to support future activities. Provide status to include analysis and reports to management consistent with program and customer requirements. Support and improve business processes. Identify areas for efficiencies and provide process improvements. Develop and support creation of technical documentation. Support configurationmanagement tasks within the team. Track project execution, identify, and mitigate project risk. Work independently and within teams where appropriate. Provide briefings to internal team and assist with briefings to senior government customers. Required Skills Bachelor's degree or equivalent experience in project management, scheduling, or business processes. Experience with Project planning, schedule development, and resource allocation … briefing skills with ability to work in a fast paced multi-tasking environment. Desired Skills System Engineering and project planning experience, working medium to large projects. Experience working Test Management programs, specifically ALM Octane Experience with JIRA, Confluence, and integrated scheduling programs Technical writing expertise Experience with the concepts and practice of Digital Engineering Environment, Authoritative Sources of Truth More ❯
must possess strong oral and written communications skills, and must be able to present findings/results to internal and external organizations. Preferred Skills: Experience with cable/interconnect configuration management. Knowledge of Product Data Management (PDM) or Produce Lifecycle Management (PLM) software Hands-on experience with the development and testing of aerospace sensor systems. Education/ More ❯
maintain Quality Assurance procedures for inspecting, testing, and evaluating assembly products. Support audits, assign corrective actions, and verify implementation. Assist with preparing and maintaining a wide range of Quality Management System process and procedure related documentation. Maintain compliant and nonconformance processing through records and tracking systems, including root-cause analysis and corrective actions. Document quality assurance activities with internal … Power Point, Word, Visio Extreme attention to detail is a must. Desired Qualifications: IPC-A-610 certification. IPC-A-620 certification. ISO 9001:2015 experience. ASME Y14 standards familiarity. ConfigurationManagement and Document Management experience. More ❯
with the Business Unit Manager. The role acts as the Project Engineer (PE) and is responsible for the definition of the avionics system, software & hardware requirements and their subsequent management and verification through development and qualification testing. Duties and Responsibilities: • Conceptualize, analyze, design, develop and integrate air data systems. Cradle to grave ownership of the new product. • Support proposal … efforts by leading the team to deliver a technical proposal, which includes the design concept, compliance matrix, cost estimate, and timeline. • Utilize requirement management tools to effectively provide traceability, decomposition, change impact analysis, and verification/validation in support of a structured development process to meet industry-standard guidelines. • Compose system requirements and decompose to lower levels for aerospace … Validation Activities. • Experience in electronic hardware and firmware design, typically with products related to avionics and/or flight controls. • Experience using one or more of the available requirements management tools such as DOORS, Requisite Pro, Reqtify, etc. • Experience using modern configurationmanagement, problem reporting, and action item tracking tools. More ❯
environments. Key Responsibilities: Lead and support the integration of subsystems, ensuring compatibility across hardware, software, communications, and networking layers. Develop and maintain Interface Control Documents (ICDs), integration plans, and configuration baselines. Conduct end-to-end system validation testing, identifying and resolving technical issues related to interoperability and performance. Work closely with Enterprise Architects and System Engineers to verify technical … with requirements and design intent. Support technical reviews, factory acceptance testing, site acceptance testing, and final system delivery processes. Collaborate with stakeholders in KSA for on-site integration support, configuration adjustments, and training facilitation. Ensure system integration is documented in compliance with U.S. and KSA security, safety, and quality standards. Participate in the creation of user manuals, standard operating … domain systems-preferably in defense, aerospace, or telecom sectors. Hands-on experience with integration of C4ISR, IT, networking, or sensor systems. Strong technical documentation skills and experience working with configurationmanagement tools. Ability to troubleshoot and resolve technical integration issues across multi-vendor components. U.S. citizenship required with the ability to obtain a security clearance (if not already More ❯